Sciweavers

5119 search results - page 176 / 1024
» Security Privacy
Sort
View
CCS
2007
ACM
15 years 10 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
CCS
2000
ACM
15 years 8 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
SP
2007
IEEE
101views Security Privacy» more  SP 2007»
15 years 10 months ago
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems
Ted Huffmire, Brett Brotherton, Gang Wang, Timothy...